Author: George Milliken

cyber resilience toolkit: spending money

Cyber Resilience Toolkit: Spending Money

cyber toolkit spending money online

Consume: spending money online

September 1, 2021

Overview More and more of the money we spend is spent online or digitally. Whether that is debit card or Go Henry, mobile contactless with Google or Apple Pay, or online payments like PayPal and even cryptocurrency.Learners need to understand the benefits and risks of using digital money and online… Read more

Consume – Gambling

September 1, 2021

More and more of the money we spend is spent online or digitally and that includes gambling. Learners need to understand the benefits and risks of using digital money and online accounts to make purchases. Do they understand the amount of targeted advertising that they are exposed to? Are they… Read more

social media: messaging

Social Media: Messaging

  go to cyber resilience toolkit home

Social media is an inaccurate umbrella term that is used to cover a wide range of apps and services. This section covers apps and services that might be considered social media but that are typically used for messaging directly or in group chats, such as Snapchat and WhatsApp.

 

It covers:

  • main features of the services
  • potential risks
  • how to setup an account
  • using platform settings to manage risk
  • how to report harmful conduct

Main features

Platforms like Snapchat and Whatsapp offer a way to send direct messages to individuals or group chats. These can include text, voice notes, photos or video.

Potential risks

Ofcom data suggests that the most common potential harms on these types of platforms are:

With these harms, it is important to differentiate between problematic behaviour and harmful behaviour where there is a risk to safety, such as an adult contacting a child.

How to set up an account

Almost any app will require the same details to create an account and access its content:

  • username (usually an email or the phone’s linked Google or Apple account)
  • password

There may be requests for additional information, such as name, address or phone number – these are not always required.

These links explain how to register for and set up an account on the most popular platforms:

Using platform settings to manage risk

Each platform will have a setting for security and privacy – this can be used to control a number of aspects, including:

  • who can see posts or media
  • who can contact or follow you

These links explain how to use settings to reduce the potential risks of unwanted contact, being tagged in abusive or bullying content, or seeing inappropriate or unwanted content on the most popular platforms:

How to report harmful conduct

If a user thinks they have been potentially harmed on the platform they should be aware of how to report this to the platform and potentially the police and trusted adults.

These links explain how to report users and content on the most popular platforms:

social media: feeds

Social Media: Feeds

  go to cyber resilience toolkit home

Social media is an inaccurate umbrella term that is used to cover a wide range of apps and services. This section covers apps and services that might be considered social media but that are typically used for viewing feeds and content, such as Instagram, TikTok and Twitter.

It covers:

  • main features of the services
  • potential risks
  • how to setup an account
  • using platform settings to manage risk
  • how to report harmful conduct

Main features

Platforms like Instagram, Twitter and TIkTok offer a way to connect with, and view content, from people across the world. Increasingly these are for brands or individual ‘influencers’. They usually post short videos (sometimes live), photos and short pieces of text.

These platforms also offer direct messaging and the ability to ‘tag’ other people in the posts or content – usually with @username.

It might be useful to think of these services in the context of their main media:

  • Instagram – photos
  • Twitter – short texts
  • TikTok – short videos

Potential risks

Ofcom data suggests that the most common potential harms on these types of platforms are:

The presence of brands and ‘influencers’ adds the potential risk of scams and influenced or pressurised spending.

Because they offer direct messaging and the ability to ‘tag’ other people in the posts or content there is also a risk of abusive or bullying messages.

How to set up an account

Almost any app will require the same details to create an account and access its content:

  • username (usually an email or the phone’s linked Google or Apple account)
  • password

There may be requests for additional information, such as name, address or phone number – these are not always required.

These links explain how to register for and set up an account on the most popular platforms:

Using platform settings to manage risk

Each platform will have a setting for security and privacy – this can be used to control a number of aspects, including:

  • who can see posts or media
  • who can contact or follow you

These links explain how to use settings to reduce the potential risks of unwanted contact, being tagged in abusive or bullying content, or seeing inappropriate or unwanted content on the most popular platforms:

How to report harmful conduct

If a user thinks they have been potentially harmed on the platform they should be aware of how to report this to the platform and potentially the police and trusted adults.

These links explain how to report users and content on the most popular platforms:

Digital Literacy Series 2024

Digital Literacy Series

DigiLearnScot home

This section contains a series of three documents designed to support educators in delivering the Scottish Government Digital Learning and Teaching Strategy (2016). The three documents detail:

  • the digital skills and knowledge that teachers require for their workplace
  • the skills and knowledge that learners require, with contexts and examples for teaching them
  • guidance on how teachers might apply their digital skills to enhance aspects of learning and teaching, such as delivery and assessment

digital learning teaching strategy Scottish Government

YouTube player

Boy girl digital skills - The support document aims to make clear the digital knowledge and skills that learners require to be digitally competent. Being digitally competent means being able to use the most common devices and apps. It is…
Man holding iPad as a digital pencil case - The toolkit document outlines the skills and knowledge that comprise digital literacy in the General Teaching Council Scotland (GTCS)'s standards. The skills are organised into three levels: Essential skills that are required by every teacher…
Man woman holding tech - This document aims to support educators in evaluating their use of digital to enhance learning and teaching. It takes features of How Good is Our School and exemplifies how digital can be used to enhance…

 

 

 

scottish computing science conference

Scottish Computing Science Conference – live from 3 locations across the country! Saturday 11th November 2023

Open to all early years practitioners, primary school teachers, and secondary school teachers who teach Computing.

During this unmissable event, you will have the opportunity to hear from industry experts who will share insights into future career prospects and to attend practical breakout sessions designed to empower you with innovative teaching methods for the classroom

The conference will be held on Saturday 11th November at 10am simultaneously at the following venues;

 

When registering, you can choose the nearest venue to you.

 

 

The proposed agenda for the day is as follows:

  • 9:45 Arrival. Registration and refreshments
  • 10am Welcome
  • Ollie Bray Strategic Director Education Scotland – Inverness College (streamed to all venues)

 

  • 10:15am Keynotes
  • Karen Meechan ScotlandIS – West Lothian College/Livingston
  • tbc – West of Scotland College/Paisley
  • tbc – Inverness college

 

  • 11:45am Workshop Session 1

 

  • 12:30pm Lunch

 

  • 1:00pm Workshop Session 2
  • 2:15pm Workshop Session 3

 

  • 3pm Closing Speaker tbc

 

  • 3:15pm Networking Event

A Microsoft Form will be sent to you nearer the event to allow you to select the three workshops that best suit your needs from a list and to allow you to select your dietary requirements.

Use this link to sign up for your nearest event

 GET TICKETS 

Cyber resilience and internet safety: enabled or dependent

When assessing the potential risks of online behaviour, it is important to evaluate whether it is internet-dependent or internet-enabled: is the internet required for this risk or behaviour to happen?

This should be the first point of evaluating whether it is in a cyber or internet incident or a societal or safeguarding one and help you find the best support for the issue.

  go to cyber home